Please turn on your JavaScript for this page to function normally.
Fake Adobe Security Update malware campaign

Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …

Compliance Enforcer 3.0 released

Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …

Qualys and RSA expand IT-GRC collaboration

Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …

Ex-con helps feds foil an ATM hacking scheme

Thor Alexander Morris had a plan. The plan involved reprograming certain ATMs so that they would overpay him when he made a withdrawal, giving out $20 instead of $1 bills …

Lessons to be learned from Facebook privacy changes

The recent Facebook privacy changes, the public outcry they caused and the petition by a group of U.S. senators to the Federal Trade Commission to restrict the amount of …

Google’s new Web application security course

As a part of its effort to educate Web application developers on how to sidestep common programming mistakes that leave the doors open for attackers, Google has unveiled a …

Demonstration of Facebook account credentials theft

When you use a computer other than your own, you have to be especially careful about what online accounts you access – particularly if the computer in question is in a …

Money mules wanted

Reading about people unwittingly becoming money mules for cybercriminals, a lot of people wonder if they would be able to spot if the offer they received or searched for is …

Analyze the network behavior of unknown malware samples

The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the …

Rogue software details: AKM Antivirus 2010 Pro

AKM Antivirus 2010 Pro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Continued growth of rogue antivirus activity

Sunbelt Software announced the top 10 most prevalent malware threats for the month of April 2010. The list of detections for April is little changed from March with the …

PortalProtect 2.0: Web threat protection, content-filtering and data loss prevention

Trend Micro PortalProtect 2.0 supports the Microsoft SharePoint 2010 platform and is backed by the Trend Micro Smart Protection Network infrastructure which scans, filters and …

Don't miss

Cybersecurity news